{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:12:44Z","timestamp":1730301164041,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.195","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"1587-1593","source":"Crossref","is-referenced-by-count":28,"title":["Towards Building an Automated Security Compliance Tool for the Cloud"],"prefix":"10.1109","author":[{"given":"Kazi Wali","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Abu Shohel","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Jukka","family":"Ylitalo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Welcome to Keystone the OpenStack Identity Service!","year":"0","key":"19"},{"journal-title":"OpenStack > Open Source Cloud Computing Software","year":"0","key":"17"},{"journal-title":"Horizon The OpenStack Dashboard Project-Horizon 2012 2 Documentation","year":"0","key":"18"},{"journal-title":"Security Services-Verizon Enterprise Solutions","year":"0","key":"15"},{"journal-title":"State of Enterprise Security Report 2010","year":"0","key":"16"},{"journal-title":"ISO\/IEC 27002 Code of Practice","year":"0","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.35"},{"journal-title":"Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance","year":"2009","author":"mather","key":"11"},{"key":"12","first-page":"71","article-title":"Security compliance: The next frontier in security research","author":"julisch","year":"2009","journal-title":"Proceedings of the 2008 New Security Paradigms Workshop"},{"journal-title":"Welcome to Nova's Documentation-2012 1-dev Documentation","year":"0","key":"21"},{"journal-title":"Architectural Styles and the Design of Network-Based Software Architectures","year":"2000","author":"fielding","key":"20"},{"journal-title":"OpenVAS-About OpenVAS Software","year":"0","key":"22"},{"journal-title":"Piston Cloud Computing","year":"0","key":"23"},{"journal-title":"PCI-compliant Cloud Reference Architecture","year":"2010","author":"prafullchandra","key":"24"},{"key":"25","article-title":"Auditing for standards compliance in the cloud: Challenges and directions","volume":"1","author":"rasheed","year":"2003","journal-title":"The International Arab Journal of Information Technology"},{"journal-title":"Automated Security Analysis of Infrastructure Clouds","year":"2010","author":"bleikertz","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866853"},{"journal-title":"Piston CloudAudit Implementation on Github","year":"0","key":"28"},{"journal-title":"CloudTrust Protocol Cloud Security Alliance","year":"0","key":"29"},{"journal-title":"Cloud Security Alliance","year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.78"},{"journal-title":"NIST gov-Computer Security Division-Computer Security Resource Center","year":"0","key":"10"},{"journal-title":"KuppingerCole Trend Report-Top Trends 2012-2013","year":"2012","author":"kuppinger","key":"1"},{"journal-title":"Nessus 5-Tenable Network Security","year":"0","key":"30"},{"journal-title":"Understanding Health Information Privacy","year":"0","key":"7"},{"journal-title":"ISO 27001 ISO27001 Information Security Standard","year":"0","key":"6"},{"journal-title":"Cloud Control Matrix (CCM) Cloud Security Alliance","year":"0","key":"5"},{"journal-title":"CloudAudit","year":"0","key":"4"},{"journal-title":"Official Source of PCI DSS Data Security Standards","year":"0","key":"9"},{"journal-title":"COBIT-IT Governance Framework-Information Assurance Control-ISACA","year":"0","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06681020.pdf?arnumber=6681020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:36:43Z","timestamp":1490229403000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6681020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.195","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}